First Page | Document Content | |
---|---|---|
![]() Date: 2015-11-22 02:25:26Cryptography Schnorr signature Random oracle Optimal asymmetric encryption padding Cryptographic hash function Digital signature Oracle machine Hash function Oracle Database Padding | Add to Reading List |
![]() | Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. RogawayDocID: 1rlwp - View Document |
![]() | Certifying RSA Saqib A. Kakvi, Eike Kiltz, and Alexander May Faculty of Mathematics Horst G¨ ortz Institute for IT-Security Ruhr University Bochum, GermanyDocID: 1qO3E - View Document |
![]() | Practical Cryptanalysis of iso/iecand emv Signatures⋆ Jean-S´ebastien Coron1 , David Naccache2 , Mehdi Tibouchi2 , and Ralf-Philipp Weinmann1 1 Universit´e du Luxembourg 6, rue Richard Coudenhove-Kalergi l-13DocID: 1qNBV - View Document |
![]() | Randomized Partial Checking Revisited Shahram Khazaei, Douglas Wikstr¨om, February 13, 2012 AbstractDocID: 1qDIf - View Document |
![]() | Microsoft PowerPoint - NPROM-zhang.pptxDocID: 1pGwl - View Document |